Skip to main content

Showing 1–5 of 5 results for author: Elias, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.06106  [pdf, other

    cs.LG cs.AI cs.CY

    Identifying, measuring, and mitigating individual unfairness for supervised learning models and application to credit risk models

    Authors: Rasoul Shahsavarifar, Jithu Chandran, Mario Inchiosa, Amit Deshpande, Mario Schlener, Vishal Gossain, Yara Elias, Vinaya Murali

    Abstract: In the past few years, Artificial Intelligence (AI) has garnered attention from various industries including financial services (FS). AI has made a positive impact in financial services by enhancing productivity and improving risk management. While AI can offer efficient solutions, it has the potential to bring unintended consequences. One such consequence is the pronounced effect of AI-related un… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

    Comments: 12 pages, 3 figures

  2. arXiv:1607.07011  [pdf, ps, other

    math.NT cs.CC cs.DM

    On Generalized Addition Chains

    Authors: Yara Elias, Pierre McKenzie

    Abstract: Given integers d >= 1, and g >= 2, a g-addition chain for d is a sequence of integers a_0=1, a_1, a_2,..., a_{r-1}, a_r=d where a_i=a_{j_1}+a_{j_2}+...+a_{j_k}, with 2 =< k =< g, and 0 =< j_1 =< j_2 =< ... =< j_k =< i-1. The length of a g-addition chain is r, the number of terms following 1 in the sequence. We denote by l_g(d) the length of a shortest addition chain for d. Many results have been e… ▽ More

    Submitted 24 July, 2016; originally announced July 2016.

    Comments: 13 pages

    MSC Class: 11B75

    Journal ref: INTEGERS, Volume 14, A16, 2014, http://www.integers-ejcnt.org/vol14.html

  3. arXiv:1508.01375  [pdf, ps, other

    math.NT cs.CR

    Ring-LWE Cryptography for the Number Theorist

    Authors: Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange

    Abstract: In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems [Eisenträger-Hallgren-Lauter, Elias-Lauter-Ozman-Stange] gives rise to interesting questions about number fields. We extend these attacks and survey related open problems in number theory, including spectral distortion of an algebrai… ▽ More

    Submitted 23 September, 2015; v1 submitted 6 August, 2015; originally announced August 2015.

    Comments: 20 Pages

    MSC Class: 11T71; 94A60

  4. arXiv:1502.03708  [pdf, other

    cs.CR math.NT

    Provably weak instances of Ring-LWE

    Authors: Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange

    Abstract: The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but have only been closely examined for cyclotomic number rings. In this paper, we state and examine the… ▽ More

    Submitted 8 August, 2015; v1 submitted 12 February, 2015; originally announced February 2015.

    Comments: 24 pages including computer code, minor modifications and typos corrected

    MSC Class: 11T71; 94A60

  5. arXiv:1110.5892  [pdf, ps, other

    quant-ph cs.ET cs.IT

    Semi-optimal Practicable Algorithmic Cooling

    Authors: Yuval Elias, Tal Mor, Yossi Weinstein

    Abstract: Algorithmic Cooling (AC) of spins applies entropy manipulation algorithms in open spin-systems in order to cool spins far beyond Shannon's entropy bound. AC of nuclear spins was demonstrated experimentally, and may contribute to nuclear magnetic resonance (NMR) spectroscopy. Several cooling algorithms were suggested in recent years, including practicable algorithmic cooling (PAC) and exhaustive AC… ▽ More

    Submitted 26 October, 2011; originally announced October 2011.

    Comments: 13 pages, 5 figures

    Journal ref: Phys. Rev. A 83 (2011) 042340